What is Ollama? #ai #coding#ollama#llama
Ali Issa
What is Ollama? #ai #coding#ollama#llama
1:00
Connect Semantic Kernel to Open Source models via Ollama
Ali Issa
Connect Semantic Kernel to Open Source models via Ollama
4:58
Running Llama 3.1 locally using LM Studio
Ali Issa
Running Llama 3.1 locally using LM Studio
0:52
Llama 3 1 #ai #coding #aiagent #semantickernel #llama3
Ali Issa
Llama 3 1 #ai #coding #aiagent #semantickernel #llama3
1:00
Semantic Kernel Intro #ai #aiagent #chatgpt #coding #programming #semantickernel
Ali Issa
Semantic Kernel Intro #ai #aiagent #chatgpt #coding #programming #semantickernel
1:00
Run Llama 3.1 or Any Open-Source Model Locally with LM Studio
Ali Issa
Run Llama 3.1 or Any Open-Source Model Locally with LM Studio
3:57
Introduction to Semantic Kernel
Ali Issa
Introduction to Semantic Kernel
5:00
Extracting Data from Documents with Document Intelligence and GPT-3.5
Ali Issa
Extracting Data from Documents with Document Intelligence and GPT-3.5
7:46
Portswigger Lab: Exploiting LLM APIs with excessive agency
Ali Issa
Portswigger Lab: Exploiting LLM APIs with excessive agency
7:24
PortSwigger Lab Walkthrough: Web Cache Poisoning with an Unkeyed Header Using Param Miner
Ali Issa
PortSwigger Lab Walkthrough: Web Cache Poisoning with an Unkeyed Header Using Param Miner
9:07
Portswigger Lab: CSRF where token validation depends on request method
Ali Issa
Portswigger Lab: CSRF where token validation depends on request method
8:06
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
Ali Issa
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
7:23
Mastering DOM XSS via Client-Side Prototype Pollution in Under 3 Minutes with DOM Invader
Ali Issa
Mastering DOM XSS via Client-Side Prototype Pollution in Under 3 Minutes with DOM Invader
3:06
Pentesting JWTs: Cracking weak keys using JWT_TOOL
Ali Issa
Pentesting JWTs: Cracking weak keys using JWT_TOOL
5:55
Understanding JWT Vulnerabilities: JWT Crack Attack
Ali Issa
Understanding JWT Vulnerabilities: JWT Crack Attack
5:02
Understanding JWT Vulnerabilities: The 'None' Vulnerability
Ali Issa
Understanding JWT Vulnerabilities: The 'None' Vulnerability
19:25
Hunting Input Validation Vulnerabilities in Juice Shop
Ali Issa
Hunting Input Validation Vulnerabilities in Juice Shop
4:54
Mastering IDOR Vulnerability Hunting: Find IDORs in less than 10 minutes with Autorize!
Ali Issa
Mastering IDOR Vulnerability Hunting: Find IDORs in less than 10 minutes with Autorize!
8:44
In-band SQL injection - What is it, and why should we care?
Ali Issa
In-band SQL injection - What is it, and why should we care?
12:16
Cross-Site Scripting (XSS) Explained And Demonstrated
Ali Issa
Cross-Site Scripting (XSS) Explained And Demonstrated
32:35
Genomgång av Burp Suite
Ali Issa
Genomgång av Burp Suite
29:52